Comments to the Federal Trade Commission on the CAN-SPAM Rule Review, 16 C.F.R. Part 316, Project No. R711010 [PDF]
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316. The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect ...
Ford, Roger Allan
core +1 more source
Clean‐Limit 2D Superconductivity in a Thick Exfoliated Kagome Film
This study reports clean‐limit 2D superconductivity in a thick kagome system, analogous to the 3D case. It observes a drop in superfluid stiffness near the superconducting transition and a cusp‐like feature in the angular dependence of the upper critical field.
Fei Sun +3 more
wiley +1 more source
Face Off: An Examination of State Biometric Privacy Statutes & Data Harm Remedies [PDF]
As biometric authentication becomes an increasingly popular method of security among consumers, only three states currently have statutes detailing how such data may be collected, used, retained, and released.
Rivera, Michael A.
core +1 more source
e-Authentication for online assessment: A mixed-method study [PDF]
Authenticating the students’ identity and authenticity of their work is increasingly important to reduce academic malpractices and for quality assurance purposes in Education.
Apampa +14 more
core +1 more source
Direct Evidence of Topological Dirac Fermions in a Low Carrier Density Correlated 5d Oxide
The 5d oxide BiRe2O6 is discovered as a low‐carrier‐density topological semimetal hosting symmetry‐protected Dirac fermions stabilized by nonsymmorphic symmetries. Angle‐resolved photoemission spectroscopy, quantum oscillations, and magnetotransport measurements reveal gapless Dirac cones, quasi‐2D Fermi surfaces, high carrier mobility, and a field ...
Premakumar Yanda +11 more
wiley +1 more source
FOCAL: A Forgery Localization Framework Based on Video Coding Self-Consistency
Forgery operations on video contents are nowadays within the reach of anyone, thanks to the availability of powerful and user-friendly editing software. Integrity verification and authentication of videos represent a major interest in both journalism (e ...
Sebastiano Verde +5 more
doaj +1 more source
Fermi Surface Nesting and Anomalous Hall Effect in Magnetically Frustrated Mn2PdIn
Mn2PdIn, a frustrated inverse Heusler alloy, showing electronic‐structure driven anomalous Hall effect with Weyl crossings, Fermi‐surface nesting and near‐zero magnetization ideal for low‐magnetization spintronics. Abstract Noncollinear magnets with near‐zero net magnetization and nontrivial bulk electronic topology hold significant promise for ...
Afsar Ahmed +7 more
wiley +1 more source
Authenticity and Admissibility of Social Media Website Printouts [PDF]
Social media posts and photographs are increasingly denied admission as evidence in criminal trials. Courts often cite issues with authentication when refusing to admit social media evidence.
Angus-Anderson, Wendy
core +1 more source
Mean-Set Attack: Cryptanalysis of Sibert et al. Authentication Protocol
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge.
Mosina, Natalia, Ushakov, Alexander
core +1 more source
Multimodal decision-level fusion for person authentication [PDF]
In this paper, the use of clustering algorithms for decision-level data fusion is proposed. Person authentication results coming from several modalities (e.g., still image, speech), are combined by using fuzzy k-means (FKM), fuzzy vector quantization ...
Bors, A.G., Chatzis, V., Pitas, I.
core +3 more sources

